Sciweavers

7821 search results - page 1446 / 1565
» Nested Ordered Sets and their Use for Data Modelling
Sort
View
130
Voted
CODASPY
2011
14 years 4 months ago
Privacy-preserving activity scheduling on mobile devices
—Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users’ personal schedules. Users also access popular contextbase...
Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hu...
109
Voted
PLDI
2009
ACM
15 years 7 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
100
Voted
JUCS
2008
143views more  JUCS 2008»
15 years 20 days ago
Market Microstructure Patterns Powering Trading and Surveillance Agents
: Market Surveillance plays important mechanism roles in constructing market models. From data analysis perspective, we view it valuable for smart trading in designing legal and pr...
Longbing Cao, Yuming Ou
PODS
2002
ACM
168views Database» more  PODS 2002»
16 years 25 days ago
Conjunctive Selection Conditions in Main Memory
We consider the fundamental operation of applying a conjunction of selection conditions to a set of records. With large main memories available cheaply, systems may choose to keep...
Kenneth A. Ross
ELPUB
2006
ACM
15 years 6 months ago
CityInMyPocket: Digital Walking Guides
By the end of this year visitors to the Flemish town of Mechelen can discover the city with the help of the new CityInMyPocket walking guide. Instead of following a person or a bo...
Steven Depuydt, Jeroen Vanattenhoven, Jan Engelen
« Prev « First page 1446 / 1565 Last » Next »